Leveraging Tech Services for Bio Imaging ResearchThe Biomedical Imaging Lab at Beckman Institute decreased their processing time from over 260 days to just a few hours by leveraging Amazon Web Services at Illinois, provided by Technology Services....

Gel Imaging on a BudgetWinter is coming.
It’s not just a popular phrase from a television program. It’s a motivating force for Drs. Erik Sacks and Lindsay Clark.
Sacks, Associate Professor of Perennial Grass Breeding and...

HandshakeThis article was created by a Technology Services student employee. Our student employees attend, engage, and report on campus events that feature technology. Students provide a unique perspective on...

Physics for EveryoneThis article was created by a Technology Services student employee. Our student employees attend, engage, and report on campus events that feature technology. Students provide a unique perspective on...

Protect Your Device Physically and DigitallyProtecting your device includes both physical and digital security.
We’ve written about preventing theft and registering your computer with Tech Services so we can help find it if it is stolen. But...

U of I Box Keeps Your Data SafeStacks of exams and papers, spreadsheets full of grades, and empty coffee cups.
These three things are connected. They’re certainly all part of midterms season here at Illinois. If you teach, chances...

Protect Your Data: Encrypt Your DeviceThere are a lot of ways to protect your data. For those who choose to store files on their local hard drive, a strong password is the first line of defense against threats. That helps prevent people...

Assessing Your RisksRisk isn't something that we like to think about, but of course we face it daily.
The Electronic Frontier Foundation has put together an article on Risk Assessment guiding questions to ask yourself.

Analyzing Your RiskData breaches, where personal information, credit data, or health information is disclosed, are all too common. The results of these breaches could include fines, legal costs, bad publicity, and...

Where is Your Data?There used to be one option for storing your data. Your local hard drive. External hard drives hadn't been developed yet, and the cloud hadn't even been considered. Now, people have to decide...

Do You Know Your Data?Think about the amount of data you have. Financial information, medical records, photos, music, movies, academic work...those are all basic, but what about the other data do you have that you...

How Secure Are Your Passwords500 million. 68 million. 32 million.
That’s how many accounts have been hacked at Yahoo, Dropbox, and Twitter, respectively, in the past couple years...and that’s just the tip of the iceberg. Fraud,...

Protecting Yourself On Public Wi-FiYou’re sitting at a table, desperately wanting to check facebook or email, but don’t have a cellular signal. You log in to the free Wi-Fi and type your passwords in. And that's when it happens:...

Don't Get Phished. Be Cyber SecurePhishing is one of the most common threats to Illinois. Numerous times a year cyber criminals attempt to gain secure information by trying to trick readers into providing private information such as...

Students Stop Hackers While Earning Course Credit
The University of Illinois at Urbana-Champaign is a hub of research activity that generates tons of research data. For the last six years, for instance, the National Science Foundation (NSF) has...